Sciweavers

5234 search results - page 707 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICDE
2006
IEEE
163views Database» more  ICDE 2006»
16 years 6 months ago
A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks
Wireless sensor networks generate a vast amount of data. This data, however, must be sparingly extracted to conserve energy, usually the most precious resource in battery-powered ...
Adam Silberstein, Carla Schlatter Ellis, Jun Yang ...
VLSID
2007
IEEE
126views VLSI» more  VLSID 2007»
16 years 5 months ago
An ECO Technique for Removing Crosstalk Violations in Clock Networks
Crosstalk noise in the clock network of digital circuits is often detected late in the design cycle, sometimes as late as after first silicon. It is therefore necessary to fix cros...
Amit Kumar, Krishnendu Chakrabarty, Chunduri Rama ...
PERCOM
2007
ACM
16 years 4 months ago
Practical Exploitation of the Energy-Latency Tradeoff for Sensor Network Broadcast
As devices become more reliant on battery power, it is essential to design energy efficient protocols. While there is a vast amount of research into power save protocols for unicas...
Matthew J. Miller, Indranil Gupta
155
Voted
MOBIHOC
2008
ACM
16 years 4 months ago
Energy efficient multi-path communication for time-critical applications in underwater sensor networks
Due to the long propagation delay and high error rate of acoustic channels, it is very challenging to provide reliable data transfer for time-critical applications in an energy-ef...
Zhong Zhou, Jun-Hong Cui
ICDS
2009
IEEE
15 years 12 months ago
A Hybrid Approach for Clustering-Based Data Aggregation in Wireless Sensor Networks
—In a wireless sensor network application for tracking multiple mobile targets, large amounts of sensing data can be generated by a number of sensors. These data must be controll...
Woo Sung Jung, Keun Woo Lim, Young-Bae Ko, Sang-Jo...